Firefox 3.0.x < 3.0.6 Multiple Vulnerabilities

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.

Synopsis :

The remote Windows host contains a web browser that is affected by
multiple vulnerabilities.

Description :

The installed version of Firefox 3.0.x is earlier than 3.0.6. Such
versions are potentially affected by the following security issues :

- There are several stability bugs in the browser engine
that could lead to crashes with evidence of memory
corruption. (MFSA 2009-01)

- A chrome XBL method can be used in conjunction with
'window.eval' to execute arbitrary JavaScript within
the context of another website, violating the same
origin policy. (MFSA 2009-02)

- A form input control's type could be changed during the
restoration of a closed tab to the path of a local file
whose location was known to the attacker. (MFSA 2009-03)

- An attacker may be able to inject arbitrary code into a
chrome document and then execute it with chrome
privileges if he can trick a user into downloading a
malicious HTML file and a .desktop shortcut file.
(MFSA 2009-04)

- Cookies marked HTTPOnly are readable by JavaScript via
the 'XMLHttpRequest.getResponseHeader' and
'XMLHttpRequest.getAllResponseHeaders' APIs.
(MFSA 2009-05)

- The 'Cache-Control: no-store' and 'Cache-Control:
no-cache' HTTP directives for HTTPS pages are ignored
by Firefox 3, which could lead to exposure of
sensitive information. (MFSA 2009-06)

See also :

Solution :

Upgrade to Firefox 3.0.6 or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 35581 ()

Bugtraq ID: 33598

CVE ID: CVE-2009-0352

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now